3S CoDeSys Improper Access Control
Summary
| CVE | CVE-2012-6068 |
|---|---|
| State | PUBLISHED |
| Assigner | icscert |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-01-21 21:55:01 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service. |
Risk And Classification
Primary CVSS: v3.1 9.8 CRITICAL from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-284 | CWE-264 | CWE-284 CWE-284
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | CVSS | 9.8 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 2.0 | [email protected] | Primary | 10 | AV:N/AC:L/Au:N/C:C/I:C/A:C |
CVSS v3.1 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0 Breakdown
AV:N/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | 3s-software | Codesys Runtime System | 2.3.9.35 | All | All | All |
| Application | 3s-software | Codesys Runtime System | 2.3.9.36 | All | All | All |
| Application | 3s-software | Codesys Runtime System | 2.3.9.37 | All | All | All |
| Application | 3s-software | Codesys Runtime System | 2.3.9.8 | All | All | All |
| Application | 3s-software | Codesys Runtime System | 2.4.0 | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | 3S-Smart Software Solutions | CODESYS Control Runtime Embedded | affected 2.3.2.8 custom | Not specified |
| CNA | 3S-Smart Software Solutions | CODESYS Control Runtime Full | affected 2.4.7.40 custom | Not specified |
| CNA | 3S-Smart Software Solutions | CODESYS Control RTE | affected 2.3.7.17 custom | Not specified |
| CNA | Festo | CECX-X-C1 Modular Master Controller With CoDeSys | affected All | Not specified |
| CNA | Festo | CECX-X-M1 Modular Controller With CoDeSys And SoftMotion | affected All | Not specified |
| CNA | 3S-Smart Software Solutions | CoDeSys | unaffected 3.X | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 404 - File Not Found | CISA | af854a3a-2127-422b-91ae-364da2661108 | www.us-cert.gov | US Government Resource |
| Project Basecamp 3S CoDeSys Vulns and Tools | af854a3a-2127-422b-91ae-364da2661108 | www.digitalbond.com | |
| Detail | af854a3a-2127-422b-91ae-364da2661108 | www.codesys.com | Vendor Advisory |
| Festo CECX-X-(C1/M1) Controller Vulnerabilities | ICS-CERT | af854a3a-2127-422b-91ae-364da2661108 | ics-cert.us-cert.gov | US Government Resource |
| www.cisa.gov/news-events/ics-advisories/icsa-14-084-01 | [email protected] | www.cisa.gov | |
| www.cisa.gov/news-events/ics-advisories/icsa-13-011-01 | [email protected] | www.cisa.gov | |
| us.codesys.com/ecosystem/security | [email protected] | us.codesys.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Independent researcher Reid Wightman of IOActive, formerly of Digital Bond has validated that the patch, issued by 3S, mitigates theses vulnerabilities. (en)
Additional Advisory Data
Solutions
CNA: CoDeSys recommends upgrading to the latest version, which is Version 3. It can be downloaded here https://store.codesys.com/engineering/codesys.html .3S released a patch which implements a password for authentication to the device. The patch can be downloaded from the CoDeSys Download Center http://www.codesys.com/download.html . CoDeSys Version 3.X is not affected by these vulnerabilities.
Workarounds
CNA: 3S also recommends the usage of standard security methods like firewalls or virtual private network (VPN) access to prevent unauthorized access to the controller.